Home Malware Programs Ransomware Bmd Ransomware

Bmd Ransomware

Posted: September 8, 2020

The Bmd Ransomware is a file-locking Trojan from a Ransomware-as-a-Service family known as the Dharma Ransomware and the Crysis Ransomware. Immediate infection symptoms in Windows centralize around 'locked' or encrypted media files that will not open without the threat actor's custom decryption information. Users should have protected backups for recovering their files, even though anti-malware applications should delete the Bmd Ransomware quickly.

File-Locker Trojans Coming in Pairs

An oppressive force inside the file-locker Trojan industry, the Crysis Ransomware can thank much of its prominence, and numerous campaigns, to the user-friendly aspects of its Trojan-building kit. A Ransomware-as-a-Service consists of hundreds of variants, including early samples like the Dharma Ransomware and the Radxlove7@india.com Ransomware, as well as the 'modern-day' WSHLP Ransomware, the Cl Ransomware or the Bmd Ransomware. The last two Trojans are running simultaneous campaigns in September.

Unlike its close relative, the Cl Ransomware, the Bmd Ransomware pretends that it's a Windows component ('Winhost') while it installs itself and initiates its data-blocking attacks. Like all file-locker Trojans from the same family, it can use a secure means of encrypting media like documents, images, archives, and other formats, and prevent them from opening in any other programs. Every file thus affected is edited for bearing the Trojan's 'bmd' extension, along with a custom e-mail address and a random ID string.

In its essentials, the Bmd Ransomware has few changes from other examples of its Ransomware-as-a-Service family. It has a sub-megabyte size for quick installation and downloading and is compatible with most versions of Windows. The 32-bit Trojan also can delete the Shadow Volume Copies o the Restore Points, making it impossible for users without other backups to recover any files that it locks without the significant and not-recommended risk of paying the Trojan's ransom. The Bmd Ransomware advertises this service in an HTA pop-up alert and TXT file, with traditional English instructions for the Crysis Ransomware RaaS.

Wiping Out the Profit in Favorite Ransomware-as-a-Services

Although its family is a favorite among threat actors that deploy 'professional' file-locker Trojans, the Bmd Ransomware's group isn't lacking in encryption security. Despite numerous analyses of the Trojan software variants throughout the years, there are no currently-compatible unlocking services for modern versions like this one. Any victim's best recovery chances depend on backups, especially on non-local devices that lack connections to the internet or other non-secure PCs.

Malware researchers have no meaningful information on the distribution channels for the Bmd Ransomware's campaign. The Trojan's affiliate threat actor might use brute-force attacks for cracking passwords of vulnerable networks or send e-mail messages with disguised, poisoned attachments. Totally-random distribution, such as torrents and fake movie or cheat downloads, also is a possibility, albeit a lesser one for the Crysis Ransomware group.

Users with responsible Web-browsing behavior can mitigate or remove most risks of the above issues. Any anti-malware product with credible threat-detecting defenses, also should find and delete the Bmd Ransomware.

Windows users don't need any more security issues than they already have, but Ransomware-as-a-Services don't perish spontaneously. Their extinction requires users to protect their files and reject the ransoms that Trojans like grow into fortunes.

Loading...